HacKer

Chapter 1192: Powerful broiler!

.

Xia Guo time, July 5, the evening is close to nine o'clock. It was only eight o'clock in the morning when it was converted into Li Jianguo time.

Rafael was tracked by a mysterious hacker early in the morning. After getting the help of Shi Lei incarnation vest Wisdon, an important clue was traced.

The eleventh transit server of the mysterious intruder is a web server of the official website of NHK TV!

What is the most famous thing about the hacker community in recent times?

The answer is definitely two world-class hackers. With NHK TV as the battlefield, there have been many wonderful hacking matchups!

The two world-class hackers are Rafael and Mr. M. The web server of the official website of NHK TV is only in the middle of the gun.

Today, the Web server of the official website of NHK TV suddenly became the mysterious hacker invading Rafael, controlling the eleventh transit server. Even without Shi Lei’s reminder, Raphael himself will have a Lenovo association about Mr.

"Wisdon, I don't believe you. Just, you know my relationship with Mr. M, there are so... forget it, don't say it, Wisdon, is there any log record for your anti-tracking? Can you show me the log? "Raphael asked.

Rafael is not too impulsive. Hearing the web server of Mr. NHK’s official website and Mr. M, he is clamoring for a duel with Mr. M.

Raphael’s anti-tracking log is in the anti-tracking process. A log that is automatically recorded by the system will definitely be generated.

Shi Lei did not hesitate and agreed directly. Then, through the voice communication channel, the system records the log and hands it to Raphael. "Mr. Fini, about your relationship with Mr. M, we know the Mirui Technology Group. Now, Mr. M has a bad relationship with our Miri Technology Group. Therefore, Mr. M is our common enemy. ""

Rafael quickly browsed Shi Lei's past anti-tracking log. Personally confirmed the eleventh transit server of the mysterious intruder, it is indeed the web server of the official website of NHK TV!

"Wisdon, do you suspect that this is Mr. M, is there a ghost behind him?" Raphael asked Shi Lei.

Shi Lei thought a little and took the initiative to make a false opinion. "I don't know! However, according to my understanding of Mr. M. His defense technology can't be so bad. So, I think it shouldn't be Mr. M."

Although Shi Lei volunteered that the mysterious intruder is not Mr. M, such a statement is better than saying that the intruder is Mr. M. If Shi Lei volunteered, the mysterious intruder is Mr. M. Instead, Raphael suspects that the mysterious intruder is not Mr. M.

However, Shi Lei volunteered that the mysterious intruder is not Mr. M. In Raphael's heart, he would prefer the mysterious intruder to Mr. M.

This kind of performance is called confrontational psychology. The human heart usually involuntarily rebuts the views of others. In particular, in the case of only two people, it is usually not agreed with the idea of ​​opening the person first.

Shi Lei is using this kind of psychology. Designed a pit for Raphael and let Raphael take the initiative to jump in.

"Maybe it’s not Mr. M!" Raphael replied. "This invades my scorpion. His intrusion is different from Mr. M."

Shi Lei was a little surprised in his heart. Did he speculate that Raphael’s mentality was wrong? Or is Rafael too convinced of Wisdon?

"However, Wisdon, I also feel that Mr. M! The hacker who invaded this time, the more unlike Mr. M, the more suspicion Mr. M is. I really can't think of it. Which hacker is showing me? After enough strength, I have to fight with me." Raphael spoke again.

Shi Lei’s heart was a little relieved. He thought that Raphael really agreed with his own statement, and did not doubt Mr. M!

If Raphael does not doubt Mr. M, then the opportunity to frame Mr. M so well, Shi Lei can only helplessly give up.

"Mr. Fini, the mysterious intruder, is it Mr. M, we don't know for the time being. However, as long as we follow it, we will have the opportunity to know the real IP address of the other party and then analyze the identity of the other party." Shi Lei made a suggestion .

"That's right!" Rafael seconded, "Wisdon, then continue to track the real IP address of the intruder. The defense matters, hand it to me."

Shi Lei definitely responded: "Okay, Mr. Fini, I will inform you immediately once I find any useful clues." After that, Shi Lei cut off the power of the voice-changing microphone again.

"Jie Shier, analyze the NSK TV official website's Web server connection IP address!" Shi Lei issued an order to the clothes, he himself thought, how to use this matter to seek the maximum benefit.

"Sir, the system retrieved the Web server of the official website of NHK TV station, and connected more than 110,000 IP addresses. After the system automatically scanned and analyzed the exclusion, the following suspicious connection IP addresses were listed." Yi Zhuer responded to Shi Lei.

Backtracking IP addresses is not a simple task, it can even be quite complicated.

For example, a hacker has five transit servers as broilers, where the A server is the most terminal springboard, and the hacker's terminal connects to the IP address, all of which are the IP addresses of the A server.

Then, to track down to the hackers hidden behind the five transit servers, first find the connection IP address connected to the B server in the A server.

Don't think that this is a simple job, just find the connection server IP address of the A server, B server. If you know the address of the B server or the tag information in advance, and then look for it in the connection IP address of the A server, it is indeed an easy task.

But what if you don't know beforehand?

The IP address of the connection to the A server is usually more than one B server, but tens of thousands, or even tens of millions of connection IP addresses.

It is really not easy to find the correct connection IP address in so many connected IP addresses! In order to accurately determine the connection IP address that needs to be found, it is necessary to analyze the connection data and trace it to the upper-level server according to the data flow at the end of the A server. Thus, the first level and the first level are tracked, and finally the source of the data stream is found.

With the help of the clothes, Shi Lei traces the data flow of the mysterious intruder step by step. At the same time, it is necessary to avoid being discovered by intruders, so as to avoid the mysterious intruders and directly cut off the data stream.

Although the way to cut off the data stream is a bit rude, disconnecting the intrusion in this way will be the ultimate source of anti-tracking personnel. But if the source's real IP address is irrelevant to the intruder, then it makes no sense.

In order to ensure that the mysterious intruders can be traced and the identity information of the mysterious intruders is ascertained as much as possible, Shi Lei’s anti-tracking is very careful.

More than ten minutes passed, and Raphael asked: "Wisdon, is there any new clue?"

Shi Lei opened the power switch of the voice-changing microphone and replied: "Mr. Fini, I am sorry, I am still tracking. The intruder's transit server has a lot of defense strength. If there is any latest news, I will inform you immediately. of."

"Okay!" Raphael responded with a bit of frustration.

Regardless of Rafael's thoughts, Shi Lei once again turned off the power switch of the voice-changing microphone and continued to trace the clues of the mysterious invaders with the clothes.

After almost ten minutes, Shi Lei finally met a powerful broiler!

All the temptations of Shi Lei were all resisted by the powerful broilers of the mysterious invaders. This powerful broiler, through Shi Lei's query, has a computing performance of at least 10tflops!

This computing performance has been the same as the origin of the parent server, the supercomputer. In the first half of 2006, among the world's top 500 supercomputers, it can also be ranked 59th.

Faced with a powerful broiler with a computing performance of 10tflops, Shi Lei did not mobilize more powerful computing resources, directly breaking through the defense of the other side, but carefully testing the system vulnerabilities.

Shi Lei holds a lot of system vulnerabilities and is a vulnerability that has not yet been announced. Shi Lei needs to test it now. The unpublished loopholes he has mastered can enter this powerful broiler.

More than ten unpublished vulnerabilities have been tested in succession, but this powerful broiler server system, without any response information, Shi Lei could not help but be a little surprised.

To know that Shi Lei is a born-again person, he has the loopholes that will be announced in the future. However, this powerful broiler with a computing performance of 10tflops does not have the flaws that Shi Lei tried.

This illustrates one thing!

The mysterious intruder is really powerful! At least he also mastered more than a dozen unreleased vulnerabilities that Shi Lei had tried before, and at the same time, in the Linux operating system core program, the corresponding vulnerabilities were supplemented.

‘I don’t believe that this **** intruder has mastered all the vulnerability information! ‘Shi Lei’s heart snorted and decided to come up with a killer.

This killer is a vulnerability discovered by Shi Lei himself, and it is an unpopular system underlying code vulnerability. It belongs to a very high-level vulnerability. Shi Lei named him ‘the ground thorn.’

It means that this kind of attack is like a spike that suddenly pops out in the ground. It is difficult to defend.

Through the underlying code level vulnerability of the system, Shi Lei finally entered a powerful broiler with a computing performance of 10tflops. In this powerful broiler, Shi Lei found some information.

Some information about the identity of mysterious invaders!

.

PS: Thanks for your support